Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks

Abstract

Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of an node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The identification of spoofing attackers, determining the number of attackers, localizing multiple adversaries and eliminating them is a challenging task in Wireless Sensor Network. The K-Means clustering approach is used to detect the spoofing attackers and localize them. This approach did not predict the attackers accurately. To overcome this problem, this paper proposes Chronological Likelihood Fraction Test (CLFT) as a fast and effective mobile replica node detection scheme to detect the spoofing attackers when the node is fixed or in movement. In addition, it uses the inherited spatial correlation of Received Signal Strength (RSS) from wireless nodes to detect the spoofing attacks. It formulates the problem of determining the number of attackers as a multi class detection problem. The Support Vector Machines (SVM) method is used to train the data to further improve the accuracy of determining the number of attackers. Analytical and simulation experiments result shows that the proposed scheme detects the attackers in Wireless Sensor Network in an efficient and robust manner at the cost of reasonable overheads.

Authors and Affiliations

P. Kiruthika Devi, Dr. R. Manavalan

Keywords

Related Articles

A Surveillance of Clustering Multi Represented Objects

Recent technological advances have tremendously increased the amount of collected data. Besides the total amount of collected information, the complexity of data objects increases as well. With the growing amount of dat...

A Review of Various Deconvolution Techniques for License Plate Recognition

A number plate is specific identification of a vehicle used to uncover the one who involves in hit and run accidents. The image capture from the fast moving vehicles will be unrecognizable by human because snapshot prov...

Wardowski Type Fixed Point Theorems in Complete Metric Spaces

In this paper, we state and prove Wardowski type fixed point theorems in metric space by using a modified generalized F-contraction maps. These theorems extend other well-known fundamental metrical fixed point theorems...

Access Control List

With the growth of internetwork, ACL’s have now become very important for network administrator. ACL’s are one of the main features of today’s internetwork router. Routers generally check each incoming packet against th...

Towards A New Approach Using RFID in High Schools and Universities

Everyday objects are generating a large amount of data that should be stored in the memories of their chips and communicated to a reader. One of the most important technologies used in the Internet of Things is RFID. Ra...

Download PDF file
  • EP ID EP19604
  • DOI -
  • Views 244
  • Downloads 4

How To Cite

P. Kiruthika Devi, Dr. R. Manavalan (2015). Evolution and Performance Analysis of Multiple Spoofing Attackers in Wireless Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(2), -. https://europub.co.uk./articles/-A-19604